Across
- 2. ______@capgemini.com for forwarding suspicious email from an unknown sender that seems unusual to CORP.
- 4. The process of making copies of data or files to use in the event the original data are lost or destroyed.
- 6. Network security device or a software program that monitors and filters incoming & outgoing traffic.
- 8. _______ generates a one-time-password (OTP) to connect to Capgemini services.
- 9. Use ___.capgemini.com to share documents containing personal data.
Down
- 1. Practice that can reduce the risk of data leaks by protecting the confidentiality of information while it is transmitted over the internet
- 2. Phishing that targets a specific group or individuals such as the company’s system administrators.
- 3. Information of strategic value that can only be shared among a few individuals is COMPANY _________
- 5. Tools used to store multiple passwords.
- 7. The first thing you should do after your business laptop is stolen is to report the situation to your technical ______ team
